Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoNovel phising campaign uses corrupted Word documents to evade securitywww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNovel phising campaign uses corrupted Word documents to evade securitywww.bleepingcomputer.comKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square2fedilink
minus-squarejaybone@lemmy.worldlinkfedilinkEnglisharrow-up0·2 days agoThey’ve been doing this since the 90s, so…
They’ve been doing this since the 90s, so…